0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Hacker's Challenge 3 (Paperback, 3rd edition): David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi Hacker's Challenge 3 (Paperback, 3rd edition)
David Pollino, Bill Pennington, Tony Bradley, Himanshu Dwivedi
bundle available
R1,773 R1,445 Discovery Miles 14 450 Save R328 (18%) Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The stories about phishing attacks against banks are so true-to-life, it's chilling." --Joel Dubin, CISSP, Microsoft MVP in Security Every day, hackers are devising new ways to break into your network. Do you have what it takes to stop them? Find out in Hacker's Challenge 3. Inside, top-tier security experts offer 20 brand-new, real-world network security incidents to test your computer forensics and response skills. All the latest hot-button topics are covered, including phishing and pharming scams, internal corporate hacking, Cisco IOS, wireless, iSCSI storage, VoIP, Windows, Mac OS X, and UNIX/Linux hacks, and much more. Each challenge includes a detailed explanation of the incident--how the break-in was detected, evidence and clues, technical background such as log files and network maps, and a series of questions for you to solve. In Part II, you'll get a detailed analysis of how the experts solved each incident.

Hacking Voip (Paperback): Himanshu Dwivedi Hacking Voip (Paperback)
Himanshu Dwivedi
R1,404 Discovery Miles 14 040 Ships in 10 - 15 working days

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information. Hacking VoIP takes a dual approach to VoIP security, explaining its many security holes to hackers and administrators. If you're serious about security, and you either use or administer VoIP, you should know where VoIP's biggest weaknesses lie and how to shore up your security. And if your intellectual curiosity is leading you to explore the boundaries of VoIP, Hacking VoIP is your map and guidebook. Hacking VoIP will introduce you to every aspect of VoIP security, both in home and enterprise implementations. You'll learn about popular security assessment tools, t

Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions (Paperback, Ed): Rich Cannings, Himanshu Dwivedi, Zane Lackey Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions (Paperback, Ed)
Rich Cannings, Himanshu Dwivedi, Zane Lackey
R1,581 R1,293 Discovery Miles 12 930 Save R288 (18%) Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Lock down next-generation Web services "This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0-based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in flaws, and secure AJAX, Flash, and XML-driven applications. Real-world case studies illustrate social networking site weaknesses, cross-site attack methods, migration vulnerabilities, and IE7 shortcomings. Plug security holes in Web 2.0 implementations the proven Hacking Exposed way Learn how hackers target and abuse vulnerable Web 2.0 applications, browsers, plug-ins, online databases, user inputs, and HTML forms Prevent Web 2.0-based SQL, XPath, XQuery, LDAP, and command injection attacks Circumvent XXE, directory traversal, and buffer overflow exploits Learn XSS and Cross-Site Request Forgery methods attackers use to bypass browser security controls Fix vulnerabilities in Outlook Express and Acrobat Reader add-ons Use input validators and XML classes to reinforce ASP and .NET security Eliminate unintentional exposures in ASP.NET AJAX (Atlas), Direct Web Remoting, Sajax, and GWT Web applications Mitigate ActiveX security exposures using SiteLock, code signing, and secure controls Find and fix Adobe Flash vulnerabilities and DNS rebinding attacks

Mobile Application Security (Paperback, Ed): Himanshu Dwivedi, Chris Clark, David Thiel Mobile Application Security (Paperback, Ed)
Himanshu Dwivedi, Chris Clark, David Thiel
R1,556 R1,286 Discovery Miles 12 860 Save R270 (17%) Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Secure today's mobile devices and applicationsImplement a systematic approach to security in your mobile application development with help from this practical guide. Featuring case studies, code examples, and best practices, Mobile Application Security details how to protect against vulnerabilities in the latest smartphone and PDA platforms. Maximize isolation, lockdown internal and removable storage, work with sandboxing and signing, and encrypt sensitive user information. Safeguards against viruses, worms, malware, and buffer overflow exploits are also covered in this comprehensive resource. Design highly isolated, secure, and authenticated mobile applications Use the Google Android emulator, debugger, and third-party security tools Configure Apple iPhone APIs to prevent overflow and SQL injection attacks Employ private and public key cryptography on Windows Mobile devices Enforce fine-grained security policies using the BlackBerry Enterprise Server Plug holes in Java Mobile Edition, SymbianOS, and WebOS applications Test for XSS, CSRF, HTTP redirects, and phishing attacks on WAP/Mobile HTML applications Identify and eliminate threats from Bluetooth, SMS, and GPS services Himanshu Dwivedi is a co-founder of iSEC Partners (www.isecpartners.com), an information security firm specializing in application security. Chris Clark is a principal security consultant with iSEC Partners. David Thiel is a principal security consultant with iSEC Partners.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Life of Jesus Christ, Revised - The…
Paperback R203 R188 Discovery Miles 1 880
Reviews of Physiology, Biochemistry and…
Bernd Nilius, Pieter De Tombe, … Hardcover R3,782 R3,493 Discovery Miles 34 930
Focused Psychotherapy - A Casebook Of…
Nick Cummings, Mike Sayama Hardcover R4,267 Discovery Miles 42 670
Aflatoxins in Food - A Recent…
Khalid Rehman Hakeem, Carlos A. F. Oliveira, … Hardcover R4,614 Discovery Miles 46 140
Water Hammer Simulations
S Mambretti Hardcover R1,087 Discovery Miles 10 870
LocknLock Pet Dry Food Container (750ml)
R71 Discovery Miles 710
Raz Tech Microphone Stereo Audio Cable…
R399 R179 Discovery Miles 1 790
Huntlea Original Two Tone Pillow Bed…
R650 R446 Discovery Miles 4 460
Sinotec STL-32S1 32'' HD LED Netflix…
R2,869 Discovery Miles 28 690
Narreskip - Gedigte
Johan Myburg Paperback R250 Discovery Miles 2 500

 

Partners